CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
f60e4cfd4bb49102953bd11074043be036400732c22a7cddd8b19ac95f193a6e.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f60e4cfd4bb49102953bd11074043be036400732c22a7cddd8b19ac95f193a6e.dll
Resource
win10v2004-20220812-en
Target
f60e4cfd4bb49102953bd11074043be036400732c22a7cddd8b19ac95f193a6e
Size
58KB
MD5
68d0516e983cab3ada1fcb38ae0335e8
SHA1
13b34fbae324cbafbf3516cb3192ad5fa7df5dae
SHA256
f60e4cfd4bb49102953bd11074043be036400732c22a7cddd8b19ac95f193a6e
SHA512
d05c6f8f794b492e8c4fe5ebfa3f6ab1568400b4c7252e0b2352a3b999a253f0b6a400ad93cdffe708b252326e1d7e096bf96cb604c8101faa0d53c2caaa2e25
SSDEEP
1536:BfQAl+7ovOeAfBLKb1wjlHFZxkZz1QlMuH:dQAl+pjw12RnWlOeuH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
time
UnhookWindowsHookEx
RegQueryValueExA
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE